Configuration Command Reference Guide
configure authority
Authority configuration is the top-most level in the SSR configuration hierarchy.
Subcommands
| command | description |
|---|---|
access-management | Role Based Access Control (RBAC) configuration. |
alarm-shelving | Configuration to control alarm shelving behavior. |
anti-virus-profile | User defined Anti-Virus profiles. |
asset-connection-resiliency | Configure Asset Connection Resiliency |
backwards-compatible-vrf-bgp-tenants | When generating tenant names for VRF BGP over SVR, do not use leading or trailing underscores. This enables backwards compatibility with router versions smaller than 5.1.3 |
bgp-service-generation | Configure Bgp Service Generation |
certificate-revocation | Certificate revocation list with CRL details. |
cli-messages | Configure Cli Messages |
client-certificate | The client-certificate configuration contains client certificate content. |
clone | Clone a list item |
conductor-address | IP address or FQDN of the conductor |
currency | Local monetary unit. |
delete | Delete configuration data |
district | Districts in the authority. |
dscp-map | Configure Dscp Map |
dynamic-hostname | Hostname format for interfaces with dynamic addresses. It is a template with subsitution variables used to generate a unique hostname corresponding to Network Interfaces that have dynamically learned IP addresses. Uses the following substitution variables: {interface-id} for Network Interface Global Identifier, {router-name} for Router Name, {authority-name} for Authority Name. For example, interface-\{interface-id\}.\{router-name\}.\{authority-name\}. |
enhanced-security-key-management | Use certificate-based security key management. |
fib-service-match | When creating FIB entries by matching route updates to service addresses, consider the specified service addresses. |
forward-error-correction-profile | A profile for Forward Error Correection parameters, describing how often to send parity packets. |
icmp-control | Settings for ICMP packet handling |
idp-profile | User defined IDP profiles. |
ipfix-collector | Configuration for IPFIX record export. |
ipv4-option-filter | Configure Ipv 4 Option Filter |
ldap-server | LDAP Servers against which to authenticate user credentials. |
management-service-generation | Configure Management Service Generation |
metrics | Configuration for metrics collection. |
metrics-profile | A collection of metrics |
name | The identifier for the Authority. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
password-policy | Password policy for user's passwords. |
pcli | Configure the PCLI. |
performance-monitoring-profile | A performance monitoring profile used to determine how often packets should be marked. |
radius-server | Radius Servers against which to authenticate user credentials. |
rekey-interval | Hours between security key regeneration. Recommended value 24 hours. |
remote-login | Configure Remote Login |
resource-group | Collect objects into a management group. |
router | The router configuration element serves as a container for holding the nodes of a single deployed router, along with their policies. |
routing | authority level routing configuration |
security | The security elements represent security policies for governing how and when the SSR encrypts and/or authenticates packets. |
security-key-management | Configure Security Key Management |
service | The service configuration is where you define the services that reside within the authority's tenants as well as the policies to apply to those services. |
service-class | Defines the association between DSCP value and a priority queue. |
service-policy | A service policy, which defines parameters applied to services that reference the policy |
session-record-profile | A profile to describe how to collect session records. |
session-records | Configure Session Records |
session-recovery-detection | Configure Session Recovery Detection |
session-type | Type of session classification based on protocol and port, and associates it with a default class of service. |
show | Show configuration data for 'authority' |
software-access | Configuration for SSR software access for the authority. Supported on managed assets only. |
software-update | Configure Software Update |
step | Configure Step |
step-repo | List of Service and Topology Exchange Protocol repositories. |
syslog-policy | Configuration for syslog message generation. |
tenant | A customer or user group within the Authority. |
traffic-profile | A set of minimum guaranteed bandwidths, one for each traffic priority |
trusted-ca-certificate | The trusted-ca-certificate configuration contains CA certificate content. |
web-messages | Configure Web Messages |
web-theme | Configure Web Theme |
configure authority access-management
Role Based Access Control (RBAC) configuration.
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
role | Configure Role |
show | Show configuration data for 'access-management' |
token | Configuration for HTTP authentication token generation. |
configure authority access-management role
Configure Role
Usage
configure authority access-management role <name>
Positional Arguments
| name | description |
|---|---|
| name | A unique name that identifies this role. |
Subcommands
| command | description |
|---|---|
capability | The capabilities that this user will be granted. |
clone | Clone a list item |
delete | Delete configuration data |
description | A description about the role. |
exclude-resource | Exclude a resource from being associated with this role. |
name | A unique name that identifies this role. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
resource | Associate this role with a resource. |
resource-group | Associate this role with a top-level resource-group. |
show | Show configuration data for 'role' |
configure authority access-management role capability
The capabilities that this user will be granted.
Usage
configure authority access-management role capability [<identityref>]
Positional Arguments
| name | description |
|---|---|
| identityref | Value to add to this list |
Description
identityref
A value from a set of predefined names.
Options:
- config-read: Configuration Read Capability
- config-write: Configuration Write Capability
- provisioning: Asset Provisioning Capability
configure authority access-management role description
A description about the role.
Usage
configure authority access-management role description [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority access-management role exclude-resource
Exclude a resource from being associated with this role.
Usage
configure authority access-management role exclude-resource <id>
Positional Arguments
| name | description |
|---|---|
| id | Configure Id |
Subcommands
| command | description |
|---|---|
id | Configure Id |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'exclude-resource' |
configure authority access-management role exclude-resource id
Configure Id
Usage
configure authority access-management role exclude-resource id [<resource-id>]
Positional Arguments
| name | description |
|---|---|
| resource-id | The value to set for this field |
Description
resource-id (string)
The identifier of the resource.
Must be either just a * asterisk or an identifier
followed by a colon which is then followed by either
an asterisk, or a path that contains only valid yang
names and list-keys separated by forward-slashes and
optionally followed by a forward-slash and an asterisk.
Example: SSR:/authority/router/MyRouter/*
configure authority access-management role name
A unique name that identifies this role.
Usage
configure authority access-management role name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority access-management role resource
Associate this role with a resource.
Usage
configure authority access-management role resource <id>
Positional Arguments
| name | description |
|---|---|
| id | Configure Id |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
generated | Indicates whether or not the resource was automatically generated |
id | Configure Id |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'resource' |
configure authority access-management role resource generated
Indicates whether or not the resource was automatically generated
Usage
configure authority access-management role resource generated [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
boolean
A true or false value.
Options: true or false
configure authority access-management role resource id
Configure Id
Usage
configure authority access-management role resource id [<resource-id>]
Positional Arguments
| name | description |
|---|---|
| resource-id | The value to set for this field |
Description
resource-id (string)
The identifier of the resource.
Must be either just a * asterisk or an identifier
followed by a colon which is then followed by either
an asterisk, or a path that contains only valid yang
names and list-keys separated by forward-slashes and
optionally followed by a forward-slash and an asterisk.
Example: SSR:/authority/router/MyRouter/*
configure authority access-management role resource-group
Associate this role with a top-level resource-group.
Usage
configure authority access-management role resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority access-management token
Configuration for HTTP authentication token generation.
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
expiration | Minutes after initial authentication that the authentication token is valid. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'token' |
configure authority access-management token expiration
Minutes after initial authentication that the authentication token is valid.
Usage
configure authority access-management token expiration [<union>]
Positional Arguments
| name | description |
|---|---|
| union | The value to set for this field |
Description
Units: minutes
Default: never
union
A value that corresponds to one of its member types.
Must be one of the following types:
(0) uint64
An unsigned 64-bit integer.
Range: 1-18446744073709551615
(1) enumeration
A value from a set of predefined names.
Options:
- never: Never expire
configure authority alarm-shelving
Configuration to control alarm shelving behavior.
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
shelf | Shelf configuration and criteria for classifying alarms as shelved. |
show | Show configuration data for 'alarm-shelving' |
configure authority alarm-shelving shelf
Shelf configuration and criteria for classifying alarms as shelved.
Usage
configure authority alarm-shelving shelf <name>
Positional Arguments
| name | description |
|---|---|
| name | An arbitrary name for the alarm shelf. |
Subcommands
| command | description |
|---|---|
applies-to | Logical group to which a configuration element applies |
category | Shelve alarms for this category. |
clone | Clone a list item |
delete | Delete configuration data |
generated | Indicates whether or not the Shelf was automatically generated as a result of Alarm Shelf generation. |
match-type | How the individual items in the shelf should be matched in order to trigger the shelving |
message-regex | Shelve alarms with messages that match this regex. |
name | An arbitrary name for the alarm shelf. |
node-name | Shelve alarms from this node. |
node-name-regex | Shelve alarms from nodes that match this regex. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
router-name | Shelve alarms from this router. |
router-name-regex | Shelve alarms from routers that match this regex. |
severity | Shelve alarms for this severity. |
show | Show configuration data for 'shelf' |
configure authority alarm-shelving shelf applies-to
Logical group to which a configuration element applies
Usage
configure authority alarm-shelving shelf applies-to <type>
Positional Arguments
| name | description |
|---|---|
| type | Type of group to which the configuration applies. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
group-name | Name of the router-group to which this configuration applies. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
resource-group | Name of the resource-group to which this configuration applies. |
router-name | Name of the router to which this configuration applies. |
show | Show configuration data for 'applies-to' |
type | Type of group to which the configuration applies. |
configure authority alarm-shelving shelf applies-to group-name
Name of the router-group to which this configuration applies.
Usage
configure authority alarm-shelving shelf applies-to group-name [<leafref>]
Positional Arguments
| name | description |
|---|---|
| leafref | Value to add to this list |
Description
leafref
A reference to an existing value in the instance data.
configure authority alarm-shelving shelf applies-to resource-group
Name of the resource-group to which this configuration applies.
Usage
configure authority alarm-shelving shelf applies-to resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority alarm-shelving shelf applies-to router-name
Name of the router to which this configuration applies.
Usage
configure authority alarm-shelving shelf applies-to router-name [<leafref>]
Positional Arguments
| name | description |
|---|---|
| leafref | Value to add to this list |
Description
leafref
A reference to an existing value in the instance data.
configure authority alarm-shelving shelf applies-to type
Type of group to which the configuration applies.
Usage
configure authority alarm-shelving shelf applies-to type [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
enumeration
A value from a set of predefined names.
Options:
- authority: Applies to all routers in the authority.
- router: Router(s) to which the configuration applies.
- router-group: Logical group of router(s) to which the configuration applies.
- resource-group: An RBAC management group to which the configuration applies
configure authority alarm-shelving shelf category
Shelve alarms for this category.
Usage
configure authority alarm-shelving shelf category [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: none
enumeration
A value from a set of predefined names.
Options:
- none: A Category of "none" indicates that Category will not be considered when evaluating alarms against this shelf
- extensible-alarm: Shelve alarms with a category of "extensible-alarm"
- system: Shelve alarms with a category of "system"
- process: Shelve alarms with a category of "process"
- interface: Shelve alarms with a category of "interface"
- platform: Shelve alarms with a category of "platform"
- peer: Shelve alarms with a category of "peer"
- base: Shelve alarms with a category of "base"
- node-base: Shelve alarms with a category of "node-base"
- global-base: Shelve alarms with a category of "global-base"
- network-interface: Shelve alarms with a category of "network-interface"
- platform-stat: Shelve alarms with a category of "platform-stat"
- redundancy: Shelve alarms with a category of "redundancy"
- giid: Shelve alarms with a category of "giid"
- asset: Shelve alarms with a category of "asset"
- prefix-delegation: Shelve alarms with a category of "prefix-delegation"
- service: Shelve alarms with a category of "service"
- bgp-neighbor: Shelve alarms with a category of "bgp-neighbor"
- msdp-neighbor: Shelve alarms with a category of "msdp-neighbor"
configure authority alarm-shelving shelf generated
Indicates whether or not the Shelf was automatically generated as a result of Alarm Shelf generation.
Usage
configure authority alarm-shelving shelf generated [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
boolean
A true or false value.
Options: true or false
configure authority alarm-shelving shelf match-type
How the individual items in the shelf should be matched in order to trigger the shelving
Usage
configure authority alarm-shelving shelf match-type [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: all
enumeration
A value from a set of predefined names.
Options:
- all: All items in the shelf must match an alarm in order to trigger the shelving.
- any: At least one item in the shelf must match an alarm in order to trigger the shelving
configure authority alarm-shelving shelf message-regex
Shelve alarms with messages that match this regex.
Usage
configure authority alarm-shelving shelf message-regex [<regex>]
Positional Arguments
| name | description |
|---|---|
| regex | The value to set for this field |
Description
regex (string)
A regular expression (regex) type.
configure authority alarm-shelving shelf name
An arbitrary name for the alarm shelf.
Usage
configure authority alarm-shelving shelf name [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority alarm-shelving shelf node-name
Shelve alarms from this node.
Usage
configure authority alarm-shelving shelf node-name [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority alarm-shelving shelf node-name-regex
Shelve alarms from nodes that match this regex.
Usage
configure authority alarm-shelving shelf node-name-regex [<regex>]
Positional Arguments
| name | description |
|---|---|
| regex | The value to set for this field |
Description
regex (string)
A regular expression (regex) type.
configure authority alarm-shelving shelf router-name
Shelve alarms from this router.
Usage
configure authority alarm-shelving shelf router-name [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority alarm-shelving shelf router-name-regex
Shelve alarms from routers that match this regex.
Usage
configure authority alarm-shelving shelf router-name-regex [<regex>]
Positional Arguments
| name | description |
|---|---|
| regex | The value to set for this field |
Description
regex (string)
A regular expression (regex) type.
configure authority alarm-shelving shelf severity
Shelve alarms for this severity.
Usage
configure authority alarm-shelving shelf severity [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: none
enumeration
A value from a set of predefined names.
Options:
- info: Shelve alarms with a severity level of "info"
- minor: Shelve alarms with a severity level of "minor"
- major: Shelve alarms with a severity level of "major"
- critical: Shelve alarms with a severity level of "critical"
- none: A Severity of "none" indicates that Severity will not be considered when evaluating alarms against this shelf
configure authority anti-virus-profile
User defined Anti-Virus profiles.
Usage
configure authority anti-virus-profile <name>
Positional Arguments
| name | description |
|---|---|
| name | Name of the profile. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
fallback-option | Defines what action the system should take for the match. |
max-filesize | Configure Max Filesize |
mime-allowlist | MIME patterns for allowing |
name | Name of the profile. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
protocol | Defines protocols to allow. |
show | Show configuration data for 'anti-virus-profile' |
url-allowlist | URL patterns for allowing |
configure authority anti-virus-profile fallback-option
Defines what action the system should take for the match.
Usage
configure authority anti-virus-profile fallback-option [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: log-and-permit
enumeration
A value from a set of predefined names.
Options:
- permit: Permit content size.
- log-and-permit: Log and Permit content size.
- block: Block content size.
configure authority anti-virus-profile max-filesize
Configure Max Filesize
Usage
configure authority anti-virus-profile max-filesize [<uint64>]
Positional Arguments
| name | description |
|---|---|
| uint64 | The value to set for this field |
Description
Default: 10000
uint64
An unsigned 64-bit integer.
configure authority anti-virus-profile mime-allowlist
MIME patterns for allowing
Usage
configure authority anti-virus-profile mime-allowlist [<string>]
Positional Arguments
| name | description |
|---|---|
| string | Value to add to this list |
Description
string
A text value.
configure authority anti-virus-profile name
Name of the profile.
Usage
configure authority anti-virus-profile name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Anti-Virus profile name (default-policy|no-ftp|http-only|none) is reserved. Length: 0-20
configure authority anti-virus-profile protocol
Defines protocols to allow.
Usage
configure authority anti-virus-profile protocol [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | Value to add to this list |
Description
enumeration
A value from a set of predefined names.
Options:
- http: Allow HTTP protocol.
- smtp: Allow SMTP protocol.
- pop3: Allow POP3 protocol.
- imap: Allow IMAP protocol.
- ftp: Allow FTP protocol.
configure authority anti-virus-profile url-allowlist
URL patterns for allowing
Usage
configure authority anti-virus-profile url-allowlist [<string>]
Positional Arguments
| name | description |
|---|---|
| string | Value to add to this list |
Description
string
A text value.
configure authority asset-connection-resiliency
Configure Asset Connection Resiliency
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
enabled | Enable asset connection resiliency by creating SSH tunnels for asset connections from managed Router to Conductor. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'asset-connection-resiliency' |
ssh-only | Only allow the asset connections from managed Router to Conductor to connect via the SSH tunnels. |
configure authority asset-connection-resiliency enabled
Enable asset connection resiliency by creating SSH tunnels for asset connections from managed Router to Conductor.
Usage
configure authority asset-connection-resiliency enabled [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: true
boolean
A true or false value.
Options: true or false
configure authority asset-connection-resiliency ssh-only
Only allow the asset connections from managed Router to Conductor to connect via the SSH tunnels.
Usage
configure authority asset-connection-resiliency ssh-only [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority backwards-compatible-vrf-bgp-tenants
When generating tenant names for VRF BGP over SVR, do not use leading or trailing underscores. This enables backwards compatibility with router versions smaller than 5.1.3
Usage
configure authority backwards-compatible-vrf-bgp-tenants [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority bgp-service-generation
Configure Bgp Service Generation
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
route-reflector-client-mesh | Generate service-route mesh for route reflector clients. |
security-policy | Security policy to be used instead of 'internal'. |
service-policy | Service policy to be used for generated BGP services. |
show | Show configuration data for 'bgp-service-generation' |
configure authority bgp-service-generation route-reflector-client-mesh
Generate service-route mesh for route reflector clients.
Usage
configure authority bgp-service-generation route-reflector-client-mesh [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority bgp-service-generation security-policy
Security policy to be used instead of 'internal'.
Usage
configure authority bgp-service-generation security-policy [<security-ref>]
Positional Arguments
| name | description |
|---|---|
| security-ref | The value to set for this field |
Description
security-ref (leafref)
This type is used by other entities that need to reference configured security policies.
configure authority bgp-service-generation service-policy
Service policy to be used for generated BGP services.
Usage
configure authority bgp-service-generation service-policy [<service-policy-ref>]
Positional Arguments
| name | description |
|---|---|
| service-policy-ref | The value to set for this field |
Description
service-policy-ref (leafref)
This type is used by other entities that need to reference configured service policies.
configure authority certificate-revocation
Certificate revocation list with CRL details.
Usage
configure authority certificate-revocation <name>
Positional Arguments
| name | description |
|---|---|
| name | An identifier for the certificate revocation. |
Subcommands
| command | description |
|---|---|
backoff-interval | A delay in seconds to apply between polling different CRL endpoints to avoid excessive concurrent download attempts. |
clone | Clone a list item |
crl-endpoint | Configure Crl Endpoint |
delete | Delete configuration data |
name | An identifier for the certificate revocation. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
polling-interval | Frequency in minutes at which to fetch CRLs. Default is 60 minutes. Valid range is (1,10080). |
show | Show configuration data for 'certificate-revocation' |
configure authority certificate-revocation backoff-interval
A delay in seconds to apply between polling different CRL endpoints to avoid excessive concurrent download attempts.
Usage
configure authority certificate-revocation backoff-interval [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: seconds
Default: 5
uint32
An unsigned 32-bit integer.
Range: 1-60
configure authority certificate-revocation crl-endpoint
Configure CRL Endpoint
Usage
configure authority certificate-revocation crl-endpoint <name>
Positional Arguments
| name | description |
|---|---|
| name | Configure Name |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
delta-uri | Override the URL to use to fetch a delta CRL. |
name | Configure Name |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'crl-endpoint' |
uri | Override the URL to use to fetch a CRL. |
configure authority certificate-revocation crl-endpoint delta-uri
Override the URL to use to fetch a delta CRL.
Usage
configure authority certificate-revocation crl-endpoint delta-uri [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Must start with scheme: http Must contain contain only alphanumeric characters
Length: 1-18446744073709551615
configure authority certificate-revocation crl-endpoint name
Configure Name
Usage
configure authority certificate-revocation crl-endpoint name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority certificate-revocation crl-endpoint uri
Override the URL to use to fetch a CRL.
Usage
configure authority certificate-revocation crl-endpoint uri [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Must start with scheme: http Must contain contain only alphanumeric characters Length: 1-18446744073709551615
configure authority certificate-revocation name
An identifier for the certificate revocation.
Usage
configure authority certificate-revocation name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority certificate-revocation polling-interval
Frequency in minutes at which to fetch CRLs. Default is 60 minutes. Valid range is 1-10080.
Usage
configure authority certificate-revocation polling-interval [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: minutes
Default: 60
uint32
An unsigned 32-bit integer.
Range: 1-10080
configure authority cli-messages
Configure Cli Messages
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
login-message | The message displayed before login through console. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'cli-messages' |
welcome-message | The message displayed after a successful login through console. |
configure authority cli-messages login-message
The message displayed before login through console.
Usage
configure authority cli-messages login-message [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority cli-messages welcome-message
The message displayed after a successful login through console.
Usage
configure authority cli-messages welcome-message [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority client-certificate
The client-certificate configuration contains client certificate content.
Usage
configure authority client-certificate <name>
Positional Arguments
| name | description |
|---|---|
| name | An identifier for the client certificate. |
Subcommands
| command | description |
|---|---|
content | Client certificate content. |
delete | Delete configuration data |
file | Name of file that contains certificate content. |
name | An identifier for the client certificate. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'client-certificate' |
validation-mode | Client certificate validation mode. |
configure authority client-certificate content
Client certificate content.
Usage
configure authority client-certificate content [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority client-certificate file
Name of file that contains certificate content.
Usage
configure authority client-certificate file [<filepointer>]
Positional Arguments
| name | description |
|---|---|
| filepointer | The value to set for this field |
Description
filepointer (string)
A string representing an allowable security related file name.
Must contain only alphanumeric characters or any of the following: _ - .
configure authority client-certificate name
An identifier for the client certificate.
Usage
configure authority client-certificate name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority client-certificate validation-mode
Client certificate validation mode.
Usage
configure authority client-certificate validation-mode [<certificate-validation-mode>]
Positional Arguments
| name | description |
|---|---|
| certificate-validation-mode | The value to set for this field |
Description
certificate-validation-mode (enumeration)
Sets the mode of certificate validation
Options:
- strict: Reject insecure certificates during import.
- warn: Warn when importing insecure certificates
configure authority conductor-address
IP address or FQDN of the conductor
Usage
configure authority conductor-address [<host>]
Positional Arguments
| name | description |
|---|---|
| host | Value to add to this list |
Description
host (union)
The host type represents either an IP address or a DNS domain name.
Must be one of the following types:
(0) ipv4-address (string)
The ipv4-address type represents an IPv4 address in dotted-quad notation.
Must be a valid IPv4 address.
(1) ipv6-address (string)
The ipv6-address type represents an IPv6 address in full, mixed, shortened, and shortened-mixed notation.
The canonical format of IPv6 addresses uses the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
Must be a valid IPv6 address.
(2) domain-name (string)
The domain-name type represents a DNS domain name. The name SHOULD be fully qualified whenever possible.
Internet domain names are only loosely specified. Section 3.5 of RFC 1034 recommends a syntax (modified in Section 2.1 of RFC 1123). The pattern above is intended to allow for current practice in domain name use, and some possible future expansion. It is designed to hold various types of domain names, including names used for A or AAAA records (host names) and other records, such as SRV records. Note that Internet host names have a stricter syntax (described in RFC 952) than the DNS recommendations in RFCs 1034 and 1123, and that systems that want to store host names in schema nodes using the domain-name type are recommended to adhere to this stricter standard to ensure interoperability.
The encoding of DNS names in the DNS protocol is limited to 255 characters. Since the encoding consists of labels prefixed by a length bytes and there is a trailing NULL byte, only 253 characters can appear in the textual dotted notation.
The description clause of schema nodes using the domain-name type MUST describe when and how these names are resolved to IP addresses. Note that the resolution of a domain-name value may require to query multiple DNS records (e.g., A for IPv4 and AAAA for IPv6). The order of the resolution process and which DNS record takes precedence can either be defined explicitely or it may depend on the configuration of the resolver.
Domain-name values use the US-ASCII encoding. Their canonical format uses lowercase US-ASCII characters. Internationalized domain names MUST be encoded in punycode as described in RFC 3492
Length: 1-253
configure authority currency
Local monetary unit.
Usage
configure authority currency [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
Default: USD
string
A text value.
configure authority district
Districts in the authority.
Usage
configure authority district <name>
Positional Arguments
| name | description |
|---|---|
| name | Name of the district. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
name | Name of the district. |
neighborhood | Neighborhoods which belong to this district. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
resource-group | Associate this district with a top-level resource-group. |
show | Show configuration data for 'district' |
configure authority district name
Name of the district.
Usage
configure authority district name [<non-default-district-name>]
Positional Arguments
| name | description |
|---|---|
| non-default-district-name | The value to set for this field |
Description
non-default-district-name (string)
A text value.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority district neighborhood
Neighborhoods which belong to this district.
Usage
configure authority district neighborhood [<neighborhood-id>]
Positional Arguments
| name | description |
|---|---|
| neighborhood-id | Value to add to this list |
Description
neighborhood-id (string)
A string identifier for network neighborhood.
Must contain only alphanumeric characters or any of the following: . _ - Length: 0-63
configure authority district resource-group
Associate this district with a top-level resource-group.
Usage
configure authority district resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority dscp-map
Configure Dscp Map
Usage
configure authority dscp-map <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the DSCP map |
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
dscp-prioritization | Mapping from incoming DSCP value to a priority. These values are used when in DSCP trust mode. |
dscp-traffic-class | Mapping from incoming DSCP value to a traffic-class. These values are used when in DSCP trust mode. |
name | The name of the DSCP map |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
resource-group | Associate this DSCP map with a top-level resource-group. |
show | Show configuration data for 'dscp-map' |
configure authority dscp-map dscp-prioritization
Mapping from incoming DSCP value to a priority. These values are used when in DSCP trust mode.
Usage
configure authority dscp-map dscp-prioritization <priority>
Positional Arguments
| name | description |
|---|---|
| priority | The priority assigned to the incoming DSCP value. |
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
dscp-range | Configure Dscp Range |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
priority | The priority assigned to the incoming DSCP value. |
show | Show configuration data for 'dscp-prioritization' |
configure authority dscp-map dscp-prioritization dscp-range
Configure Dscp Range
Usage
configure authority dscp-map dscp-prioritization dscp-range <start-value>
Positional Arguments
| name | description |
|---|---|
| start-value | Lower DSCP number. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
end-value | Upper DSCP number. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'dscp-range' |
start-value | Lower DSCP number. |
configure authority dscp-map dscp-prioritization dscp-range end-value
Upper DSCP number.
Usage
configure authority dscp-map dscp-prioritization dscp-range end-value [<dscp-end-value>]
Positional Arguments
| name | description |
|---|---|
| dscp-end-value | The value to set for this field |
Description
dscp-end-value (uint8)
Upper dscp range value. Default value is the start dscp value
Range: 0-63
configure authority dscp-map dscp-prioritization dscp-range start-value
Lower DSCP number.
Usage
configure authority dscp-map dscp-prioritization dscp-range start-value [<dscp>]
Positional Arguments
| name | description |
|---|---|
| dscp | The value to set for this field |
Description
dscp (uint8) (required)
A DSCP value (0-63)
Range: 0-63
configure authority dscp-map dscp-prioritization priority
The priority assigned to the incoming DSCP value.
Usage
configure authority dscp-map dscp-prioritization priority [<priority-id>]
Positional Arguments
| name | description |
|---|---|
| priority-id | The value to set for this field |
Description
priority-id (uint8)
An unsigned 8-bit integer.
Range: 0-3
configure authority dscp-map dscp-traffic-class
Mapping from incoming DSCP value to a traffic-class. These values are used when in DSCP trust mode.
Usage
configure authority dscp-map dscp-traffic-class <traffic-class>
Positional Arguments
| name | description |
|---|---|
| traffic-class | The traffic-class assigned to the incoming DSCP value. |
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
dscp-range | Configure Dscp Range |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'dscp-traffic-class' |
traffic-class | The traffic-class assigned to the incoming DSCP value. |
configure authority dscp-map dscp-traffic-class dscp-range
Configure Dscp Range
Usage
configure authority dscp-map dscp-traffic-class dscp-range <start-value>
Positional Arguments
| name | description |
|---|---|
| start-value | Lower DSCP number. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
end-value | Upper DSCP number. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'dscp-range' |
start-value | Lower DSCP number. |
configure authority dscp-map dscp-traffic-class dscp-range end-value
Upper DSCP number.
Usage
configure authority dscp-map dscp-traffic-class dscp-range end-value [<dscp-end-value>]
Positional Arguments
| name | description |
|---|---|
| dscp-end-value | The value to set for this field |
Description
dscp-end-value (uint8)
Upper dscp range value. Default value is the start dscp value
Range: 0-63
configure authority dscp-map dscp-traffic-class dscp-range start-value
Lower DSCP number.
Usage
configure authority dscp-map dscp-traffic-class dscp-range start-value [<dscp>]
Positional Arguments
| name | description |
|---|---|
| dscp | The value to set for this field |
Description
dscp (uint8) (required)
A DSCP value (0-63)
Range: 0-63
configure authority dscp-map dscp-traffic-class traffic-class
The traffic-class assigned to the incoming DSCP value.
Usage
configure authority dscp-map dscp-traffic-class traffic-class [<traffic-class-id>]
Positional Arguments
| name | description |
|---|---|
| traffic-class-id | The value to set for this field |
Description
traffic-class-id (enumeration)
Relative priority of traffic.
Options:
- high: High priority traffic class.
- medium: Medium priority traffic class.
- low: Low priority traffic class.
- best-effort: Best-effort priority traffic class.
configure authority dscp-map name
The name of the DSCP map
Usage
configure authority dscp-map name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority dscp-map resource-group
Associate this DSCP map with a top-level resource-group.
Usage
configure authority dscp-map resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority dynamic-hostname
Hostname format for interfaces with dynamic addresses. It is a template with subsitution variables used to generate a unique hostname corresponding to Network Interfaces that have dynamically learned IP addresses. Uses the following substitution variables: {interface-id} for Network Interface Global Identifier, {router-name} for Router Name, {authority-name} for Authority Name. For example, interface-{interface-id}.{router-name}.{authority-name}.
Usage
configure authority dynamic-hostname [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
Default: interface-{interface-id}.{router-name}.{authority-name}
string
A text value.
Must contain substitution variables:
{interface-id} for Network Interface Global Identifier
{router-name} for Router Name
{authority-name} for Authority Name
For example, interface-{interface-id}.{router-name}.{authority-name}.
Any other characters must be alphanumeric or any of the
following: - _ .
configure authority enhanced-security-key-management
Use certificate-based security key management.
Usage
configure authority enhanced-security-key-management [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority fib-service-match
When creating FIB entries by matching route updates to service addresses, consider the specified service addresses.
Usage
configure authority fib-service-match [ best-match-only | any-match ]
Positional Arguments
| name | description |
|---|---|
| best-match-only | This is the default value, and legacy behavior. When comparing prefixes from a route update to addresses configured in services, only addresses with the longest prefix match for a particular route are considered. In cases of transport overlap, services are visited in alphabetical order. |
| any-match | All service addresses that match the route update are considered when creating the FIB entries, including those with prefixes shorter than the update or those that do not have the best match service address. The transports from the service with the longest prefix are considered first. This minimizes missed entries, but may result in a higher FIB usage. |
Description
Default: best-match-only
enumeration
A value from a set of predefined names.
Options:
- best-match-only: Longest matching service prefix only.
- any-match: All service prefixes are considered.
configure authority forward-error-correction-profile
A profile for Forward Error Correection parameters, describing how often to send parity packets.
Usage
configure authority forward-error-correction-profile <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the Forward Error Correction profile |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
mode | Whether to dynamically adjust forward error correction to account for observed loss. |
name | The name of the Forward Error Correction profile |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
ratio | The ratio (expressed as x:1) which will dictate the number of data packets to transmit before a parity packet will be transmitted. |
show | Show configuration data for 'forward-error-correction-profile' |
configure authority forward-error-correction-profile mode
Whether to dynamically adjust forward error correction to account for observed loss.
Usage
configure authority forward-error-correction-profile mode [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: dynamic
enumeration
A value from a set of predefined names.
Options:
- dynamic: Alter ratio of packets to parity based on loss observed.
- static: Use a consistent ratio of packets to parity regardless of loss.
configure authority forward-error-correction-profile name
The name of the Forward Error Correction profile
Usage
configure authority forward-error-correction-profile name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority forward-error-correction-profile ratio
The ratio (expressed as x:1) which will dictate the number of data packets to transmit before a parity packet will be transmitted.
Usage
configure authority forward-error-correction-profile ratio [<uint8>]
Positional Arguments
| name | description |
|---|---|
| uint8 | The value to set for this field |
Description
Default: 10
uint8
An unsigned 8-bit integer.
Range: 2-50
configure authority icmp-control
Settings for ICMP packet handling
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
icmp-async-reply | Whether to allow ICMP replies to be forwarded without corresponding requests. |
icmp-session-match | How to differentiate ICMP sessions. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'icmp-control' |
configure authority icmp-control icmp-async-reply
Whether to allow ICMP replies to be forwarded without corresponding requests.
Usage
configure authority icmp-control icmp-async-reply [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: allow
enumeration
A value from a set of predefined names.
Options:
- drop: ICMP replies without matching requests are dropped.
- allow: ICMP replies without matching requests are forwarded.
configure authority icmp-control icmp-session-match
How to differentiate ICMP sessions.
Usage
configure authority icmp-control icmp-session-match [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: identifier-only
enumeration
A value from a set of predefined names.
Options:
- identifier-only: ICMP sessions are based on identifier.
- identifier-and-type: ICMP sessions are based on identifier and type.
configure authority idp-profile
User defined IDP profiles.
Usage
configure authority idp-profile <name>
Positional Arguments
| name | description |
|---|---|
| name | Name of the profile. |
Subcommands
| command | description |
|---|---|
base-policy | Base policy used when building rules. |
clone | Clone a list item |
delete | Delete configuration data |
name | Name of the profile. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
rule | Configure Rule |
show | Show configuration data for 'idp-profile' |
configure authority idp-profile base-policy
Base policy used when building rules.
Usage
configure authority idp-profile base-policy [<idp-policy>]
Positional Arguments
| name | description |
|---|---|
| idp-policy | The value to set for this field |
Description
idp-policy (enumeration) (required)
Predefined policies for intrusion detection actions.
Options:
- alert: A policy that only alerts.
- standard: The standard blocking and alerting policy.
- strict: A strict blocking and alerting policy.
- critical: A strict blocking and alerting policy with dynamic group critical.
configure authority idp-profile name
Name of the profile.
Usage
configure authority idp-profile name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - IDP profile name (alert|strict|standard|none) is reserved. Length: 0-63
configure authority idp-profile rule
Configure Rule
Usage
configure authority idp-profile rule <name>
Positional Arguments
| name | description |
|---|---|
| name | Name of the rule. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
description | Description of the rule. |
match | The options to use for matching. |
name | Name of the rule. |
outcome | The outcome applied to the match |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'rule' |
configure authority idp-profile rule description
Description of the rule.
Usage
configure authority idp-profile rule description [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority idp-profile rule match
The options to use for matching.
Subcommands
| command | description |
|---|---|
client-address | Client address prefix to match in the rule. |
delete | Delete configuration data |
destination-address | Destination address prefix to match in the rule. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
severities | List of severity to match in the rule. |
severity | Match vulnerabilities only with severity mentioned or above. |
show | Show configuration data for 'match' |
vulnerability | List of custom vulnerabilities to match in the rule. |
configure authority idp-profile rule match client-address
Client address prefix to match in the rule.
Usage
configure authority idp-profile rule match client-address [<ip-prefix>]
Positional Arguments
| name | description |
|---|---|
| ip-prefix | Value to add to this list |
Description
ip-prefix (union)
The ip-prefix type represents an IP prefix and is IP version neutral. The format of the textual representations implies the IP version.
Must be one of the following types:
(0) ipv4-prefix (string)
The ipv4-prefix type represents an IPv4 address prefix. The prefix length is given by the number following the slash character and must be less than or equal to 32.
A prefix length value of n corresponds to an IP address mask that has n contiguous 1-bits from the most significant bit (MSB) and all other bits set to 0.
The canonical format of an IPv4 prefix has all bits of the IPv4 address set to zero that are not part of the IPv4 prefix.
(1) ipv6-prefix (string)
The ipv6-prefix type represents an IPv6 address prefix. The prefix length is given by the number following the slash character and must be less than or equal 128.
A prefix length value of n corresponds to an IP address mask that has n contiguous 1-bits from the most significant bit (MSB) and all other bits set to 0.
The IPv6 address should have all bits that do not belong to the prefix set to zero.
The canonical format of an IPv6 prefix has all bits of the IPv6 address set to zero that are not part of the IPv6 prefix. Furthermore, IPv6 address is represented in the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
configure authority idp-profile rule match destination-address
Destination address prefix to match in the rule.
Usage
configure authority idp-profile rule match destination-address [<ip-prefix>]
Positional Arguments
| name | description |
|---|---|
| ip-prefix | Value to add to this list |
Description
ip-prefix (union)
The ip-prefix type represents an IP prefix and is IP version neutral. The format of the textual representations implies the IP version.
Must be one of the following types:
(0) ipv4-prefix (string)
The ipv4-prefix type represents an IPv4 address prefix. The prefix length is given by the number following the slash character and must be less than or equal to 32.
A prefix length value of n corresponds to an IP address mask that has n contiguous 1-bits from the most significant bit (MSB) and all other bits set to 0.
The canonical format of an IPv4 prefix has all bits of the IPv4 address set to zero that are not part of the IPv4 prefix.
(1) ipv6-prefix (string)
The ipv6-prefix type represents an IPv6 address prefix. The prefix length is given by the number following the slash character and must be less than or equal 128.
A prefix length value of n corresponds to an IP address mask that has n contiguous 1-bits from the most significant bit (MSB) and all other bits set to 0.
The IPv6 address should have all bits that do not belong to the prefix set to zero.
The canonical format of an IPv6 prefix has all bits of the IPv6 address set to zero that are not part of the IPv6 prefix. Furthermore, IPv6 address is represented in the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
configure authority idp-profile rule match severities
List of severity to match in the rule.
Usage
configure authority idp-profile rule match severities [<idp-severity>]
Positional Arguments
| name | description |
|---|---|
| idp-severity | Value to add to this list |
Description
idp-severity (enumeration)
Severity levels for IDP rules.
Options:
- minor: Filter minor or higher vulnerabilities.
- major: Filter major or higher vulnerabilities.
- critical: Filter only critical vulnerabilities.
configure authority idp-profile rule match severity
Match vulnerabilities only with severity mentioned or above.
Usage
configure authority idp-profile rule match severity [<idp-severity>]
Positional Arguments
| name | description |
|---|---|
| idp-severity | The value to set for this field |
Description
idp-severity (enumeration)
Severity levels for IDP rules.
Options:
- minor: Filter minor or higher vulnerabilities.
- major: Filter major or higher vulnerabilities.
- critical: Filter only critical vulnerabilities.
configure authority idp-profile rule match vulnerability
List of custom vulnerabilities to match in the rule.
Usage
configure authority idp-profile rule match vulnerability [<string>]
Positional Arguments
| name | description |
|---|---|
| string | Value to add to this list |
Description
string
A text value.
configure authority idp-profile rule name
Name of the rule.
Usage
configure authority idp-profile rule name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority idp-profile rule outcome
The outcome applied to the match
Subcommands
| command | description |
|---|---|
action | Defines what action the system should take for the match. |
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
severity | Modify a vulnerability severity level of the match. |
show | Show configuration data for 'outcome' |
configure authority idp-profile rule outcome action
Defines what action the system should take for the match.
Usage
configure authority idp-profile rule outcome action [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
enumeration (required)
A value from a set of predefined names.
Options:
- alert: Alert only.
- drop: Drop session.
- close-tcp-connection: Close TCP Connection.
configure authority idp-profile rule outcome severity
Modify a vulnerability severity level of the match.
Usage
configure authority idp-profile rule outcome severity [<idp-severity>]
Positional Arguments
| name | description |
|---|---|
| idp-severity | The value to set for this field |
Description
idp-severity (enumeration)
Severity levels for IDP rules.
Options:
- minor: Filter minor or higher vulnerabilities.
- major: Filter major or higher vulnerabilities.
- critical: Filter only critical vulnerabilities.
configure authority ipfix-collector
Configuration for IPFIX record export.
Usage
configure authority ipfix-collector <name>
Positional Arguments
| name | description |
|---|---|
| name | A unique name for the collector. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
interim-record-interval | The time after which a new interim record will be generated if a flow still exists. |
ip-address | The IP address or hostname of the collector. |
name | A unique name for the collector. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
port | The port of the collector. |
protocol | The transport protocol to be used when communicating with the collector. |
resource-group | Associate this IPFIX collector with a top-level resource-group. |
sampling-percentage | The percentage of flows to be selected for export OR 'dynamic'. When set to 'dynamic', the system will select a percentage based on the current data volume as follows: || < 100 Mb/s : 1 in 256 || < 1 Gb/s : 1 in 512 || < 10 Gb/s : 1 in 1024 || < 25 Gb/s : 1 in 2048 || > 25 Gb/s : 1 in 8192 || |
show | Show configuration data for 'ipfix-collector' |
template-refresh-interval | The time between template retransmissions when using the UDP protocol. |
tenant | The tenants whose records this collector should receive. An empty list indicates all tenants. |
configure authority ipfix-collector interim-record-interval
The time after which a new interim record will be generated if a flow still exists.
Usage
configure authority ipfix-collector interim-record-interval [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: seconds
Default: 120
uint32
An unsigned 32-bit integer.
Range: 60-1800
configure authority ipfix-collector ip-address
The IP address or hostname of the collector.
Usage
configure authority ipfix-collector ip-address [<host>]
Positional Arguments
| name | description |
|---|---|
| host | The value to set for this field |
Description
host (union) (required)
The host type represents either an IP address or a DNS domain name.
Must be one of the following types:
(0) ipv4-address (string) (required)
The ipv4-address type represents an IPv4 address in dotted-quad notation.
Must be a valid IPv4 address.
(1) ipv6-address (string) (required)
The ipv6-address type represents an IPv6 address in full, mixed, shortened, and shortened-mixed notation.
The canonical format of IPv6 addresses uses the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
Must be a valid IPv6 address.
(2) domain-name (string) (required)
The domain-name type represents a DNS domain name. The name SHOULD be fully qualified whenever possible.
Internet domain names are only loosely specified. Section 3.5 of RFC 1034 recommends a syntax (modified in Section 2.1 of RFC 1123). The pattern above is intended to allow for current practice in domain name use, and some possible future expansion. It is designed to hold various types of domain names, including names used for A or AAAA records (host names) and other records, such as SRV records. Note that Internet host names have a stricter syntax (described in RFC 952) than the DNS recommendations in RFCs 1034 and 1123, and that systems that want to store host names in schema nodes using the domain-name type are recommended to adhere to this stricter standard to ensure interoperability.
The encoding of DNS names in the DNS protocol is limited to 255 characters. Since the encoding consists of labels prefixed by a length bytes and there is a trailing NULL byte, only 253 characters can appear in the textual dotted notation.
The description clause of schema nodes using the domain-name type MUST describe when and how these names are resolved to IP addresses. Note that the resolution of a domain-name value may require to query multiple DNS records (e.g., A for IPv4 and AAAA for IPv6). The order of the resolution process and which DNS record takes precedence can either be defined explicitely or it may depend on the configuration of the resolver.
Domain-name values use the US-ASCII encoding. Their canonical format uses lowercase US-ASCII characters. Internationalized domain names MUST be encoded in punycode as described in RFC 3492
Length: 1-253
configure authority ipfix-collector name
A unique name for the collector.
Usage
configure authority ipfix-collector name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority ipfix-collector port
The port of the collector.
Usage
configure authority ipfix-collector port [<l4-port>]
Positional Arguments
| name | description |
|---|---|
| l4-port | The value to set for this field |
Description
Default: 4739
l4-port (uint16)
Transport (layer 4) port number.
Range: 0-65535
configure authority ipfix-collector protocol
The transport protocol to be used when communicating with the collector.
Usage
configure authority ipfix-collector protocol [<ipfix-protocol>]
Positional Arguments
| name | description |
|---|---|
| ipfix-protocol | The value to set for this field |
Description
Default: tcp
ipfix-protocol (enumeration)
Transport (Layer 4) protocol.
Options:
- tcp: Transmission Control Protocol.
- udp: User Datagram Protocol.
configure authority ipfix-collector resource-group
Associate this IPFIX collector with a top-level resource-group.
Usage
configure authority ipfix-collector resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority ipfix-collector sampling-percentage
The percentage of flows to be selected for export OR 'dynamic'. When set to 'dynamic', the system will select a percentage based on the current data volume as follows: || < 100 Mb/s : 1 in 256 || < 1 Gb/s : 1 in 512 || < 10 Gb/s : 1 in 1024 || < 25 Gb/s : 1 in 2048 || > 25 Gb/s : 1 in 8192 ||
Usage
configure authority ipfix-collector sampling-percentage [<union>]
Positional Arguments
| name | description |
|---|---|
| union | The value to set for this field |
Description
Default: dynamic
union
A value that corresponds to one of its member types.
Must be one of the following types:
(0) decimal64
A 64-bit decimal value.
Range: 0-100 Fraction digits: 16
(1) enumeration
A value from a set of predefined names.
Options:
- dynamic: Dynamically determine sampling based on data volume.
configure authority ipfix-collector template-refresh-interval
The time between template retransmissions when using the UDP protocol.
Usage
configure authority ipfix-collector template-refresh-interval [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: seconds
Default: 60
uint32
An unsigned 32-bit integer.
Range: 60-1800
configure authority ipfix-collector tenant
The tenants whose records this collector should receive. An empty list indicates all tenants.
Usage
configure authority ipfix-collector tenant [<tenant-ref>]
Positional Arguments
| name | description |
|---|---|
| tenant-ref | Value to add to this list |
Description
tenant-ref (leafref)
This type is used by other entities that need to reference configured tenants.
configure authority ipv4-option-filter
Configure Ipv 4 Option Filter
Subcommands
| command | description |
|---|---|
action | How packets containing option headers are treated when being processed. |
delete | Delete configuration data |
drop-exclusion | Option headers that will not cause the packet to be dropped when present. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'ipv4-option-filter' |
configure authority ipv4-option-filter action
How packets containing option headers are treated when being processed.
Usage
configure authority ipv4-option-filter action [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: allow-all
enumeration
A value from a set of predefined names.
Options:
- allow-all: Allow all packets that contain options headers.
- drop-all: Drop all packets that contain options headers except for those defined in the exclusion list.
configure authority ipv4-option-filter drop-exclusion
Option headers that will not cause the packet to be dropped when present.
Usage
configure authority ipv4-option-filter drop-exclusion [<uint8>]
Positional Arguments
| name | description |
|---|---|
| uint8 | Value to add to this list |
Description
uint8
An unsigned 8-bit integer.
Range: 0-255
configure authority ldap-server
LDAP Servers against which to authenticate user credentials.
Usage
configure authority ldap-server <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the LDAP server. |
Subcommands
| command | description |
|---|---|
address | The IP address or FQDN of the LDAP server. |
auto-generate-filter | When enabled, the SSR will generate user-search-base and group-search-base LDAP filters. |
bind-type | The type of binding to the LDAP server. |
certificate-assurance | LDAP assurance level to apply on server certificates in a TLS session. |
delete | Delete configuration data |
distinguished-name | The distinguished name to use for binding to the server. |
group-search-base | An optional group search LDAP filter to restrict searches for this attribute type. |
name | The name of the LDAP server. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
password | The password to use for binding to the server. |
port | Port to connect to LDAP server. |
resource-group | Associate this LDAP server with a top-level resource-group. |
search-base | The LDAP search base string. |
server-type | The type of LDAP server. |
show | Show configuration data for 'ldap-server' |
user-search-base | An optional user search LDAP filter to restrict searches for this attribute type. |
configure authority ldap-server address
The IP address or FQDN of the LDAP server.
Usage
configure authority ldap-server address [<host>]
Positional Arguments
| name | description |
|---|---|
| host | The value to set for this field |
Description
host (union) (required)
The host type represents either an IP address or a DNS domain name.
Must be one of the following types:
(0) ipv4-address (string) (required)
The ipv4-address type represents an IPv4 address in dotted-quad notation.
Must be a valid IPv4 address.
(1) ipv6-address (string) (required)
The ipv6-address type represents an IPv6 address in full, mixed, shortened, and shortened-mixed notation.
The canonical format of IPv6 addresses uses the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
Must be a valid IPv6 address.
(2) domain-name (string) (required)
The domain-name type represents a DNS domain name. The name SHOULD be fully qualified whenever possible.
Internet domain names are only loosely specified. Section 3.5 of RFC 1034 recommends a syntax (modified in Section 2.1 of RFC 1123). The pattern above is intended to allow for current practice in domain name use, and some possible future expansion. It is designed to hold various types of domain names, including names used for A or AAAA records (host names) and other records, such as SRV records. Note that Internet host names have a stricter syntax (described in RFC 952) than the DNS recommendations in RFCs 1034 and 1123, and that systems that want to store host names in schema nodes using the domain-name type are recommended to adhere to this stricter standard to ensure interoperability.
The encoding of DNS names in the DNS protocol is limited to 255 characters. Since the encoding consists of labels prefixed by a length bytes and there is a trailing NULL byte, only 253 characters can appear in the textual dotted notation.
The description clause of schema nodes using the domain-name type MUST describe when and how these names are resolved to IP addresses. Note that the resolution of a domain-name value may require to query multiple DNS records (e.g., A for IPv4 and AAAA for IPv6). The order of the resolution process and which DNS record takes precedence can either be defined explicitely or it may depend on the configuration of the resolver.
Domain-name values use the US-ASCII encoding. Their canonical format uses lowercase US-ASCII characters. Internationalized domain names MUST be encoded in punycode as described in RFC 3492
Length: 1-253
configure authority ldap-server auto-generate-filter
When enabled, the SSR will generate user-search-base and group-search-base LDAP filters.
Usage
configure authority ldap-server auto-generate-filter [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: true
boolean
A true or false value.
Options: true or false
configure authority ldap-server bind-type
The type of binding to the LDAP server.
Usage
configure authority ldap-server bind-type [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: anonymous
enumeration
A value from a set of predefined names.
Options:
- anonymous: Bind to this server anonymously.
- unauthenticated: Bind to this server with a distinguished name only.
- password: Bind to this server with a distinguished name and password.
configure authority ldap-server certificate-assurance
LDAP assurance level to apply on server certificates in a TLS session.
Usage
configure authority ldap-server certificate-assurance [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: strong
enumeration
A value from a set of predefined names.
Options:
- weak: Do not request or check any server certificates.
- mild: Ignore invalid or missing certificates but check for hostname
- moderate: Terminate on invalid certificate but ignore missing certificates.
- strong: Terminate on invalid and missing certificates.
configure authority ldap-server distinguished-name
The distinguished name to use for binding to the server.
Usage
configure authority ldap-server distinguished-name [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority ldap-server group-search-base
An optional group search LDAP filter to restrict searches for this attribute type.
Usage
configure authority ldap-server group-search-base [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority ldap-server name
The name of the LDAP server.
Usage
configure authority ldap-server name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority ldap-server password
The password to use for binding to the server.
Usage
configure authority ldap-server password [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority ldap-server port
Port to connect to LDAP server.
Usage
configure authority ldap-server port [<union>]
Positional Arguments
| name | description |
|---|---|
| union | The value to set for this field |
Description
Default: server-type-default
union
A value that corresponds to one of its member types.
Must be one of the following types:
(0) l4-port (uint16)
Transport (layer 4) port number.
Range: 0-65535
(1) enumeration
A value from a set of predefined names.
Options:
- server-type-default: Use the default based on server-type.
configure authority ldap-server resource-group
Associate this LDAP server with a top-level resource-group.
Usage
configure authority ldap-server resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority ldap-server search-base
The LDAP search base string.
Usage
configure authority ldap-server search-base [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string (required)
A text value.
Length: 1-18446744073709551615
configure authority ldap-server server-type
The type of LDAP server.
Usage
configure authority ldap-server server-type [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: ldaps
enumeration
A value from a set of predefined names.
Options:
- starttls: Connect to this server using STARTTLS. Default port is 389.
- ldaps: Connect to this server via LDAPS. Default port is 636.
- global-catalog: Connect to this server as an Active Directory Global Catalog. Default port is 3269.
configure authority ldap-server user-search-base
An optional user search LDAP filter to restrict searches for this attribute type.
Usage
configure authority ldap-server user-search-base [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority management-service-generation
Configure Management Service Generation
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
service-policy | Service policy to be used instead of auto-generated service policy. |
service-route-type | Strategy to generate service-routes for management services. |
show | Show configuration data for 'management-service-generation' |
configure authority management-service-generation service-policy
Service policy to be used instead of auto-generated service policy.
Usage
configure authority management-service-generation service-policy [<service-policy-ref>]
Positional Arguments
| name | description |
|---|---|
| service-policy-ref | The value to set for this field |
Description
service-policy-ref (leafref)
This type is used by other entities that need to reference configured service policies.
configure authority management-service-generation service-route-type
Strategy to generate service-routes for management services.
Usage
configure authority management-service-generation service-route-type [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: paths-as-next-hop
enumeration
A value from a set of predefined names.
Options:
- paths-as-next-hop: Generate paths on a node as next-hops
- paths-as-service-route: Generate paths on a node as service-route
configure authority metrics
Configuration for metrics collection.
Subcommands
| command | description |
|---|---|
application-policy-hit-count-tracking | Configure Application Policy Hit Count Tracking |
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'metrics' |
configure authority metrics application-policy-hit-count-tracking
Configure Application Policy Hit Count Tracking
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
enabled | Enable/disable tracking of policy hit counts for applications |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'application-policy-hit-count-tracking' |
configure authority metrics application-policy-hit-count-tracking enabled
Enable/disable tracking of policy hit counts for applications
Usage
configure authority metrics application-policy-hit-count-tracking enabled [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: true
boolean
A true or false value.
Options: true or false
configure authority metrics-profile
A collection of metrics
Usage
configure authority metrics-profile <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the profile |
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
delete | Delete configuration data |
filter | A list of parameter values that should be included in the output. |
metric | The ID of the metric as it exists in the REST API |
name | The name of the profile |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'metrics-profile' |
configure authority metrics-profile filter
A list of parameter values that should be included in the output.
Usage
configure authority metrics-profile filter <parameter>
Positional Arguments
| name | description |
|---|---|
| parameter | The name of the parameter being referenced |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
parameter | The name of the parameter being referenced |
show | Show configuration data for 'filter' |
value | The values that should be included if matched |
configure authority metrics-profile filter parameter
The name of the parameter being referenced
Usage
configure authority metrics-profile filter parameter [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority metrics-profile filter value
The values that should be included if matched
Usage
configure authority metrics-profile filter value [<string>]
Positional Arguments
| name | description |
|---|---|
| string | Value to add to this list |
Description
string
A text value.
configure authority metrics-profile metric
The ID of the metric as it exists in the REST API
Usage
configure authority metrics-profile metric <id>
Positional Arguments
| name | description |
|---|---|
| id | The ID of the metric as it exists in the REST API |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
description | A customizable description of this metric's purpose |
id | The ID of the metric as it exists in the REST API |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'metric' |
configure authority metrics-profile metric description
A customizable description of this metric's purpose
Usage
configure authority metrics-profile metric description [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority metrics-profile metric id
The ID of the metric as it exists in the REST API
Usage
configure authority metrics-profile metric id [<metric-id>]
Positional Arguments
| name | description |
|---|---|
| metric-id | The value to set for this field |
Description
metric-id (string)
A string metric identifier based on the stats YANG path which only uses alphanumerics, dashes, and forward slashes.
Must contain only alphanumeric characters or any of the following: - /
configure authority metrics-profile name
The name of the profile
Usage
configure authority metrics-profile name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority name
The identifier for the Authority.
Usage
configure authority name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string) (required)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority password-policy
Password policy for user's passwords.
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
deny | The number of failed login attempts before locking a user |
lifetime | The lifetime of a user's password in days |
minimum-length | The minimum length of user's password. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'password-policy' |
unlock-time | The time a user account will remained locked after failing login attempts |
configure authority password-policy deny
The number of failed login attempts before locking a user
Usage
configure authority password-policy deny [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Default: 6
uint32
An unsigned 32-bit integer.
Range: 1-65535
configure authority password-policy lifetime
The lifetime of a user's password in days
Usage
configure authority password-policy lifetime [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: days
Default: 99999
uint32
An unsigned 32-bit integer.
Range: 1-99999
configure authority password-policy minimum-length
The minimum length of user's password.
Usage
configure authority password-policy minimum-length [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Default: 9
uint32
An unsigned 32-bit integer.
Range: 8-65535
configure authority password-policy unlock-time
The time a user account will remained locked after failing login attempts
Usage
configure authority password-policy unlock-time [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: seconds
Default: 1800
uint32
An unsigned 32-bit integer.
configure authority pcli
Configure the PCLI.
Subcommands
| command | description |
|---|---|
alias | An alias is a custom PCLI command that executes another PCLI command and optionally filters the output. |
clone | Clone a list item |
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'pcli' |
configure authority pcli alias
An alias is a custom PCLI command that executes another PCLI command and optionally filters the output.
Usage
configure authority pcli alias <path>
Positional Arguments
| name | description |
|---|---|
| path | The space-delimited path to the alias. This will be the text that a user must enter to run the alias. |
Subcommands
| command | description |
|---|---|
clone | Clone a list item |
command | The PCLI command that the alias will run. |
delete | Delete configuration data |
description | A short, one line, description of the alias. This will be displayed in the PCLI as part of the command's help text. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
path | The space-delimited path to the alias. This will be the text that a user must enter to run the alias. |
resource-group | Associate this PCLI alias with a top-level resource-group. |
show | Show configuration data for 'alias' |
configure authority pcli alias command
The PCLI command that the alias will run.
Usage
configure authority pcli alias command <path>
Positional Arguments
| name | description |
|---|---|
| path | The PCLI command that the alias will run. This must be an existing PCLI command but may contain a pipe (|), output redirection (> or >>), input redirection (< or <<), or the question mark to get help (?). |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
path | The PCLI command that the alias will run. This must be an existing PCLI command but may contain a pipe (|), output redirection (> or >>), input redirection (< or <<), or the question mark to get help (?). |
show | Show configuration data for 'command' |
table-filter | Filter the output table to only include the specified columns. This is a case-insensitive match (and also excludes special characters such as dashes.) |
configure authority pcli alias command path
The PCLI command that the alias will run. This must be an existing PCLI command but may contain a pipe (|), output redirection (> or >>), input redirection (< or <<), or the question mark to get help (?).
Usage
configure authority pcli alias command path [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority pcli alias command table-filter
Filter the output table to only include the specified columns. This is a case-insensitive match (and also excludes special characters such as dashes.)
Usage
configure authority pcli alias command table-filter [<string>]
Positional Arguments
| name | description |
|---|---|
| string | Value to add to this list |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority pcli alias description
A short, one line, description of the alias. This will be displayed in the PCLI as part of the command's help text.
Usage
configure authority pcli alias description [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority pcli alias path
The space-delimited path to the alias. This will be the text that a user must enter to run the alias.
Usage
configure authority pcli alias path [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-18446744073709551615
configure authority pcli alias resource-group
Associate this PCLI alias with a top-level resource-group.
Usage
configure authority pcli alias resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority performance-monitoring-profile
A performance monitoring profile used to determine how often packets should be marked.
Usage
configure authority performance-monitoring-profile <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the performance monitoring profile. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
interval-duration | Represents the duration of a packet marking interval in milliseconds. |
marking-count | The number of packets to mark within a given interval. |
monitor-only | Collect statistics without influencing packet processing features. |
name | The name of the performance monitoring profile. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
resource-group | Associate this performance monitoring profile with a top-level resource-group. |
show | Show configuration data for 'performance-monitoring-profile' |
configure authority performance-monitoring-profile interval-duration
Represents the duration of a packet marking interval in milliseconds.
Usage
configure authority performance-monitoring-profile interval-duration [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: milliseconds
Default: 10000
uint32
An unsigned 32-bit integer.
Range: 100-3600000
configure authority performance-monitoring-profile marking-count
The number of packets to mark within a given interval.
Usage
configure authority performance-monitoring-profile marking-count [<uint16>]
Positional Arguments
| name | description |
|---|---|
| uint16 | The value to set for this field |
Description
Units: packets
Default: 100
uint16
An unsigned 16-bit integer.
Range: 1-32767
configure authority performance-monitoring-profile monitor-only
Collect statistics without influencing packet processing features.
Usage
configure authority performance-monitoring-profile monitor-only [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority performance-monitoring-profile name
The name of the performance monitoring profile.
Usage
configure authority performance-monitoring-profile name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority performance-monitoring-profile resource-group
Associate this performance monitoring profile with a top-level resource-group.
Usage
configure authority performance-monitoring-profile resource-group [<resource-group-ref>]
Positional Arguments
| name | description |
|---|---|
| resource-group-ref | Value to add to this list |
Description
resource-group-ref (leafref)
This type is used by other entities that need to reference configured resource groups.
configure authority radius-server
Radius Servers against which to authenticate user credentials.
Usage
configure authority radius-server <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the Radius server. |
Subcommands
| command | description |
|---|---|
account-creation | Control account creation behavior. |
address | The IP address or FQDN of the Radius server. |
delete | Delete configuration data |
name | The name of the Radius server. |
ocsp | Whether to check the revocation status of the Radius server's certificate. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
port | The port number Radius server listens on. |
protocol | Use TLS or UDP protocol to communicate with Radius server. |
secret | The secret key to bind to the Radius server. |
server-name | Hostname of the Radius server. |
show | Show configuration data for 'radius-server' |
timeout | Radius Request Timeout. |
configure authority radius-server account-creation
Control account creation behavior.
Usage
configure authority radius-server account-creation [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: manual
enumeration
A value from a set of predefined names.
Options:
- manual: Accounts must be created locally on the Router or Conductor before a user can log in.
- automatic: Create accounts automatically on first time login. The Radius server must contain the Vendor Specific Attribute (VSA) 'Juniper-Local-User-Name' set to the role that the user will be assigned. The role must be prefixed with 'SSR-', so to assign the user the admin role the VSA key would be set to 'SSR-admin'.
configure authority radius-server address
The IP address or FQDN of the Radius server.
Usage
configure authority radius-server address [<host>]
Positional Arguments
| name | description |
|---|---|
| host | The value to set for this field |
Description
host (union) (required)
The host type represents either an IP address or a DNS domain name.
Must be one of the following types:
(0) ipv4-address (string) (required)
The ipv4-address type represents an IPv4 address in dotted-quad notation.
Must be a valid IPv4 address.
(1) ipv6-address (string) (required)
The ipv6-address type represents an IPv6 address in full, mixed, shortened, and shortened-mixed notation.
The canonical format of IPv6 addresses uses the compressed format described in RFC 4291, Section 2.2, item 2 with the following additional rules: the :: substitution must be applied to the longest sequence of all-zero 16-bit chunks in an IPv6 address. If there is a tie, the first sequence of all-zero 16-bit chunks is replaced by ::. Single all-zero 16-bit chunks are not compressed. The canonical format uses lowercase characters and leading zeros are not allowed.
Must be a valid IPv6 address.
(2) domain-name (string) (required)
The domain-name type represents a DNS domain name. The name SHOULD be fully qualified whenever possible.
Internet domain names are only loosely specified. Section 3.5 of RFC 1034 recommends a syntax (modified in Section 2.1 of RFC 1123). The pattern above is intended to allow for current practice in domain name use, and some possible future expansion. It is designed to hold various types of domain names, including names used for A or AAAA records (host names) and other records, such as SRV records. Note that Internet host names have a stricter syntax (described in RFC 952) than the DNS recommendations in RFCs 1034 and 1123, and that systems that want to store host names in schema nodes using the domain-name type are recommended to adhere to this stricter standard to ensure interoperability.
The encoding of DNS names in the DNS protocol is limited to 255 characters. Since the encoding consists of labels prefixed by a length bytes and there is a trailing NULL byte, only 253 characters can appear in the textual dotted notation.
The description clause of schema nodes using the domain-name type MUST describe when and how these names are resolved to IP addresses. Note that the resolution of a domain-name value may require to query multiple DNS records (e.g., A for IPv4 and AAAA for IPv6). The order of the resolution process and which DNS record takes precedence can either be defined explicitely or it may depend on the configuration of the resolver.
Domain-name values use the US-ASCII encoding. Their canonical format uses lowercase US-ASCII characters. Internationalized domain names MUST be encoded in punycode as described in RFC 3492
Length: 1-253
configure authority radius-server name
The name of the Radius server.
Usage
configure authority radius-server name [<name-id>]
Positional Arguments
| name | description |
|---|---|
| name-id | The value to set for this field |
Description
name-id (string)
A string identifier which only uses alphanumerics, underscores, or dashes, and cannot exceed 63 characters.
Must contain only alphanumeric characters or any of the following: _ - Length: 0-63
configure authority radius-server ocsp
Whether to check the revocation status of the Radius server's certificate.
Usage
configure authority radius-server ocsp [<ocsp>]
Positional Arguments
| name | description |
|---|---|
| ocsp | The value to set for this field |
Description
ocsp (enumeration)
Whether to check the revocation status of a server's certificate.
Options:
- strict: Require a successful OCSP check in order to establish a connection.
- off: Do not check revocation status of the server certificate.
configure authority radius-server port
The port number Radius server listens on.
Usage
configure authority radius-server port [<port-number>]
Positional Arguments
| name | description |
|---|---|
| port-number | The value to set for this field |
Description
Default: 1812
port-number (uint16)
The port-number type represents a 16-bit port number of an Internet transport layer protocol such as UDP, TCP, DCCP, or SCTP. Port numbers are assigned by IANA. A current list of all assignments is available from <http://www.iana.org/>.
Note that the port number value zero is reserved by IANA. In situations where the value zero does not make sense, it can be excluded by subtyping the port-number type.
In the value set and its semantics, this type is equivalent to the InetPortNumber textual convention of the SMIv2.
Range: 0-65535
configure authority radius-server protocol
Use TLS or UDP protocol to communicate with Radius server.
Usage
configure authority radius-server protocol [<enumeration>]
Positional Arguments
| name | description |
|---|---|
| enumeration | The value to set for this field |
Description
Default: udp
enumeration
A value from a set of predefined names.
Options:
- udp: Use UDP protocol to communicate with Radius server.
- tls: Use TLS over TCP protocol to communicate with Radius server.
configure authority radius-server secret
The secret key to bind to the Radius server.
Usage
configure authority radius-server secret [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
Length: 1-255
configure authority radius-server server-name
Hostname of the Radius server.
Usage
configure authority radius-server server-name [<string>]
Positional Arguments
| name | description |
|---|---|
| string | The value to set for this field |
Description
string
A text value.
configure authority radius-server timeout
Radius Request Timeout.
Usage
configure authority radius-server timeout [<uint32>]
Positional Arguments
| name | description |
|---|---|
| uint32 | The value to set for this field |
Description
Units: seconds
Default: 3
uint32
An unsigned 32-bit integer.
Range: 1-86400
configure authority rekey-interval
Hours between security key regeneration. Recommended value 24 hours.
Usage
configure authority rekey-interval [<union>]
Positional Arguments
| name | description |
|---|---|
| union | The value to set for this field |
Description
Units: hours
Default: never
'rekey-interval' is deprecated and will be removed in a future software version
union
A value that corresponds to one of its member types.
Must be one of the following types:
(0) uint32
An unsigned 32-bit integer.
Range: 1-720
(1) enumeration
A value from a set of predefined names.
Options:
- never: Never regenerate security keys
configure authority remote-login
Configure Remote Login
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
enabled | Enable remote login from a Conductor to managed assets. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'remote-login' |
configure authority remote-login enabled
Enable remote login from a Conductor to managed assets.
Usage
configure authority remote-login enabled [<boolean>]
Positional Arguments
| name | description |
|---|---|
| boolean | The value to set for this field |
Description
Default: false
boolean
A true or false value.
Options: true or false
configure authority resource-group
Collect objects into a management group.
Usage
configure authority resource-group <name>
Positional Arguments
| name | description |
|---|---|
| name | The name of the resource group. |
Subcommands
| command | description |
|---|---|
delete | Delete configuration data |
description | A description about the resource-group. |
name | The name of the resource group. |
override-generated | Force auto-generated configuration and any modifications to it to persist on commit |
show | Show configuration data for 'resource-group' |